CVE-2008-1275

MailEnable <3.x - DoS

Title source: llm
STIX 2.1

Description

Multiple unspecified vulnerabilities in the SMTP service in MailEnable Standard Edition 1.x, Professional Edition 3.x and earlier, and Enterprise Edition 3.x and earlier allow remote attackers to cause a denial of service (crash) via crafted (1) EXPN or (2) VRFY commands.

Exploits (1)

exploitdb WORKING POC VERIFIED
by ryujin · pythondoswindows
https://www.exploit-db.com/exploits/5235

References (6)

Core 6
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/41083
Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/28154
Patch x_refsource_confirm
http://www.mailenable.com/hotfix/
Patch, Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/29300
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/5235
Third Party Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2008/0800/references

Scores

EPSS 0.3309
EPSS Percentile 96.9%

Details

Status published
Products (3)
mailenable/mailenable_enterprise < 3.0
mailenable/mailenable_professional < 3.0
mailenable/mailenable_standard
Published Mar 10, 2008
Tracked Since Feb 18, 2026